cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-9792,https://securityvulnerability.io/vulnerability/CVE-2024-9792,D-Link DSL-2750U R5B017 Vulnerable to Cross-Site Scripting Attacks Remotely,"A vulnerability has been identified in the D-Link DSL-2750U router, specifically within its Port Forwarding Page. The issue arises from improper handling of user input in the PortMappingDescription field, allowing remote attackers to execute cross-site scripting (XSS) attacks. This flaw can permit the injection of malicious scripts into web pages viewed by users of the affected device, potentially compromising the confidentiality and integrity of user data. The vulnerability underscores the importance of securing web interfaces and ensuring proper validation and sanitization of input parameters.",D-link,Dsl-2750u,6.1,MEDIUM,0.0005300000193528831,false,false,false,false,,false,false,2024-10-10T15:00:12.311Z,0 CVE-2024-0717,https://securityvulnerability.io/vulnerability/CVE-2024-0717,D-Link Good Line Router v2 HTTP GET Request devinfo information disclosure,"A notable vulnerability exists within various D-Link networking devices, particularly impacting the HTTP GET Request Handler component. This flaw enables malicious actors to disclose sensitive information by manipulating arguments in the input area, specifically targeting the '/devinfo' file of the affected devices. The vulnerability can be exploited remotely, making it vital for users to take immediate action to secure their devices. As the exploit has been publicly disclosed, it is crucial for users to ensure their devices are updated and configured correctly to mitigate potential security risks.",D-Link,"DAP-1360,DIR-300,DIR-615,DIR-615GF,DIR-615S,DIR-615T,DIR-620,DIR-620S,DIR-806A,DIR-815,DIR-815AC,DIR-815S,DIR-816,DIR-820,DIR-822,DIR-825,DIR-825AC,DIR-825ACF,DIR-825ACG1,DIR-841,DIR-842,DIR-842S,DIR-843,DIR-853,DIR-878,DIR-882,DIR-1210,DIR-1260,DIR-2150,DIR-X1530,DIR-X1860,DSL-224,DSL-245GR,DSL-2640U,DSL-2750U,DSL-G2452GR,DVG-5402G,DVG-5402GFRU,DVG-N5402G,DVG-N5402G-IL,DWM-312W,DWM-321,DWR-921,DWR-953,Good Line Router v2",5.3,MEDIUM,0.0006000000284984708,false,false,false,true,true,false,false,2024-01-19T15:31:04.290Z,0 CVE-2021-3708,https://securityvulnerability.io/vulnerability/CVE-2021-3708,,"D-Link router DSL-2750U with firmware vME1.16 or prior versions is vulnerable to OS command injection. An unauthenticated attacker on the local network may exploit this, with CVE-2021-3707, to execute any OS commands on the vulnerable device.",D-link,Dsl-2750u,7.8,HIGH,0.0005300000193528831,false,false,false,false,,false,false,2021-08-16T04:55:13.000Z,0 CVE-2021-3707,https://securityvulnerability.io/vulnerability/CVE-2021-3707,,"D-Link router DSL-2750U with firmware vME1.16 or prior versions is vulnerable to unauthorized configuration modification. An unauthenticated attacker on the local network may exploit this, with CVE-2021-3708, to execute any OS commands on the vulnerable device.",D-link,Dsl-2750u,5.5,MEDIUM,0.00046999999904073775,false,false,false,true,true,false,false,2021-08-16T04:55:11.000Z,0 CVE-2020-13150,https://securityvulnerability.io/vulnerability/CVE-2020-13150,,"D-link DSL-2750U ISL2750UEME3.V1E devices allow approximately 90 seconds of access to the control panel, after a restart, before MAC address filtering rules become active.",D-Link,Dsl-2750u Firmware,7.8,HIGH,0.0004400000034365803,false,false,false,false,,false,false,2020-06-15T15:56:11.000Z,0 CVE-2019-1010155,https://securityvulnerability.io/vulnerability/CVE-2019-1010155,,"D-Link DSL-2750U 1.11 is affected by: Authentication Bypass. The impact is: denial of service and information leakage. The component is: login. NOTE: Third parties dispute this issues as not being a vulnerability because although the wizard is accessible without authentication, it can't actually configure anything. Thus, there is no denial of service or information leakage",D-link,Dsl-2750u,9.1,CRITICAL,0.016459999606013298,false,false,false,false,,false,false,2019-07-23T13:18:36.000Z,0